Hi Fellow, As usual that I am going to write a tutorial on some stuff that is quite interesting during penetration testing or red teaming.
I like to share about how to generate a .sig file in order to help IDA to detect the function during reversing the code. It
I would like to discuss the attack that happened on May 2021 to one of the biggest web programming language that support about 79% web
Here is the next post that I promissed to create a simple list of the export function manually with C code. Why parsing manually of
Today, I want to write about small C code that enable you to listing out dll export and parsing some PE values from the headers.
Hi Fellows, After quite sometimes that having no update on the blog especially things related to reverse engineering. In this session, I would like to